Function report | 
Source Code:mm\kasan\common.c | 
Create Date:2022-07-28 15:50:42 | 
| Last Modify:2020-03-12 14:18:49 | Copyright©Brick | 
| home page | Tree | 
| Annotation kernel can get tool activity | Download SCCT | Chinese | 
Name:kasan_unpoison_shadow
Proto:void kasan_unpoison_shadow(const void *address, size_t size)
Type:void
Parameter:
| Type | Parameter | Name | 
|---|---|---|
| const void * | address | |
| size_t | size | 
| 165 | If size & KASAN_SHADOW_MASK Then | 
| 166 | shadow = kasan_mem_to_shadow(address + size) | 
| 168 | If IS_ENABLED(CONFIG_FOO) evaluates to 1 if CONFIG_FOO is set to 'y' or 'm',* 0 otherwise.(CONFIG_KASAN_SW_TAGS) Then shadow = tag | 
| 170 | Else shadow = size & KASAN_SHADOW_MASK | 
| Name | Describe | 
|---|---|
| __kasan_unpoison_stack | |
| kasan_unpoison_task_stack_below | Unpoison the stack for the current task beyond a watermark sp value. | 
| kasan_unpoison_stack_above_sp_to | Clear all poison for the region between the current SP and a provided* watermark value, as is sometimes required prior to hand-crafted asm function* returns in the middle of functions. | 
| kasan_alloc_pages | |
| kasan_unpoison_object_data | |
| __kasan_kmalloc | |
| kasan_kmalloc_large | |
| register_global | |
| __asan_alloca_poison | Emitted by compiler to poison alloca()ed objects. | 
| __asan_allocas_unpoison | Emitted by compiler to unpoison alloca()ed areas when the stack unwinds. | 
| kasan_unpoison_slab | 
| Source code conversion tool public plug-in interface  | X | 
|---|---|
| Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion  |